Dispersed beamforming approach for secure communication in UDN
- 29 Downloads
Wireless communication systems are prone to many security breaches due to open nature of the medium and exponential a rise in subscribers. Hence, physical layer security (PLS) has emerged as one of the dominant low complexity alternatives to overcome the impact of eavesdropping by managing the physical characteristics of the medium. In this paper, we ensure PLS to moving users which tends to experience rise in handover, as a result of proximity between users and base station. This study is based on ultra-dense network (UDN). To tackle this challenge, novel secure beamforming named as beam broadening and beam merging have been proposed. Besides, we propose a synchronization approach called synchronized mobility clustering for UDN to reduce the overheads generated due to the exchange of information about moving users. More specifically, we derive an analytical expression for secrecy outage probability—an important security metric. The effect of proposed approaches have been validated through numerical results and the results show the effectiveness of the proposed approaches against eavesdropping. Finally, the performance of the proposed scheme is evaluated and compared with the conventional beamforming approach. However, this proposed approach works well for a varied density of users and location to be targeted.
KeywordsBeamforming Security UDN SNR Beam merging Beam broadening Secrecy outage probability
- 1.Paper, W. (2018). Cisco ultra 5G packet core solution.Google Scholar
- 13.Sivanesan, K., Zou, J., Vasudevan, S., & Palat, S. (2015). Mobility performance optimization for 3GPP LTE HetNets. In Design and deployment of small cell networks (pp. 1–30).Google Scholar
- 19.Costello, D. J. (2009) Fundamentals of wireless communication (Tse, D. and Viswanath, P.) [book review], 55(2).Google Scholar
- 20.Barros, J., & Rodrigues, M. R. D. (2006). Secrecy capacity of wireless channels. In IEEE international symposium on information theory—Proceedings (pp. 356–360).Google Scholar